Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 00:38
Static task
static1
Behavioral task
behavioral1
Sample
ea44be55777e66736c9956ee7838216e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea44be55777e66736c9956ee7838216e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea44be55777e66736c9956ee7838216e_JaffaCakes118.html
-
Size
460KB
-
MD5
ea44be55777e66736c9956ee7838216e
-
SHA1
cd71beb068cd01ec0c38a6d174dc22c0cb7f75c6
-
SHA256
aede992c7f7e4e0ac7db2dbbe81751595d4e06572867e5daf6024489d4716236
-
SHA512
d3b63c64198cc5006ce9cf665b0385a707c1aa7dcfaf38b9a019e3257a94dd88d87b7e6fb731ecdb32fe169db8144993d7142ccfbf946a44d2d193e3593e03f0
-
SSDEEP
6144:S6sMYod+X3oI+YbsMYod+X3oI+YwsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3h5d+X3s5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000006ba5f6b10573a0c53774cf48960eb77673d6075c2917e469440c5581ba4d1db7000000000e8000000002000020000000e95fd18893f639a1a89cc40fa81862bdafba029fdb5b56526170d3c67d11c2209000000006bf07f8a3f06d7564abf2fea8e1e52d5212e51d2c632428832cf48331d7ecdede1c6d968c1b70eaa6bd36ba279f3b76393285022d6c228dfb077362feea0a907ffcbb1aa16186de6eb12aa352c0ebb8f1fbc68a65fceac2f4a8eb07e359f2e1cbd3e364c8e417e272f46d55fdaaa219904bd97d25f43855a043b10ad8888c29eed2555208a66695d44df7cfd5b1f1bd40000000413aacfed55ff4ff3fccc46e473963cd874b45aa79da7542eeb1c5763939d937ef6745915323e8fe277d4b7aeba9718e78905dde34350ac7cae29fec69e7d1d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8405A181-761F-11EF-923A-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000066a9d14ef33dd2940564594c254fd0da4f50eb7cf35e95a96fd6427e0e18272d000000000e8000000002000020000000d0c0653356e6e418a80f18aab6e93ee3673cd0c6971a256da6b5e9cde8f91c6e20000000ac1bda2bae9a9764ee988077d3a2676fb502bee1495be45543fc858e31f609f8400000008c27bde21a79d2025099634c8a5da73e7ef21dc161ca6179e4c3e8b15eacb3740c16b33251309bd02b6d988a4ab5b163a836d956d40a427d684caa29df0d74fe iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432868187" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00921a5e2c0adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 1224 2912 iexplore.exe 28 PID 2912 wrote to memory of 1224 2912 iexplore.exe 28 PID 2912 wrote to memory of 1224 2912 iexplore.exe 28 PID 2912 wrote to memory of 1224 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea44be55777e66736c9956ee7838216e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ca321f57d564d1aaa319b54e1ae3f2
SHA16fe98e55b5fff8dee635e83a113df1b168354242
SHA25673d7a6ccab2b4f218e64bc66128393d5f740a4daa88c7a296a2acb152f922d46
SHA512813ccc216257ea8ec381a956c3e64e3b07cfb762bb36aca733eda7dfcc18f9cbc004631b533a6296c76f26da8d4dab4d2b966b9de856557d9927f97b3df66577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce1231da8fa9a6a5f4e7acb09b0c7cd6
SHA12d4cdabb00ab7a4dd3f0511867de58028b630952
SHA256ef10aa1be8c97c878a53882258193b45573cca05c14baddb192007c314b0a5f6
SHA512b5e541eeafe17512246ff77911435bf670170d16e8584009d1d055a3fc921d29a27af2abbed1dded76a67c1eaa2305c6d83c7685b2ed937f847e0299579d90d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597d6be87ff53c107c338c7b70d8262e4
SHA1237b1eddd7d42b52ab0de4cfc4eb2e1d7be4d079
SHA2569b8cf553cfc0a079b2470eaec20d719e3e05d6dba408e5ee60eebe89ca2355af
SHA512970c45296124a2e5330180babfb296c908f2596c78927f6d9c66394e022956c4ac85be062bc3d293852e862e90b9c6d4e338f5812c6cfd621ad8657b46552d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547b56a552f52ada8e83e27ec9c8faf82
SHA1d056f3c240fc019c48ee89ef68417883319bc635
SHA2569f659f6bdf4c16e00106432ab10b1302abcd5c76132e74b971ce7bfc6c91f3f6
SHA51252f11c147f54e0837047f833c05c1efda4fec65be15126899645c4f3f862909d3e52984bb9ddc8010a292c68028f4b83cef78d8136a1f07e3180efef7de9d04a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1b2f54df6c389fe9975ad22aff4e17d
SHA167fec554aa3dbef7e188eb3a38772bd3f5eb792e
SHA2568ec726d22c800295db443015925e8f635ff9f56ea9a10abab81caf4ef2560772
SHA5128822895a94429934b64e9746e94f71cdfe7403f3c3965a3e75d5be407b2bd8ec90b67df64e744a5e2d9dfefd73d1f6855305780ea4630aebb6ca18474dc66f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c16dc9a848857a18c6c51a9aeba01b2
SHA1cde9cfdae3595517a72ecbdf5710d788a8519f8e
SHA256e8121a6b7b6f721da864441248e33bdd213fa9a1d56b38a1cdaa8cf6faf50d2b
SHA512c103e35426de3f5aff5fa6303abaf83393e26d41edac0bf11ab0d497b9811e177c189af33d8202879e91a552f9b8e4a69f2f21d24b340644c6bce9c158247912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553cf5640458c33b98557135284467826
SHA1c49462c6cc0965dff94e4532b4196eab8b93dd97
SHA256907f2712615ff9b60f9eab43b7fb2af650d8c8e1fb25ec422b55f37914653ef1
SHA51224202ab384611d6719bc82e08f895007f96e8c897697392d81e55deb8373ecb2a575ae6cc3e6e1dafafb844504258e6ddba222a1befed31e1f5c89032dd2d94b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175195ec5f71ab7c86d32a620c4ca193
SHA1b9898331b029f5c4347df60aa0ed46683b63b103
SHA25652f5de34e55a626318b78a0f5d4962f7ce3efd9b550687dd9f1b6fb3c4ed1421
SHA5125e9c58d27765436a11dbf7f4f0e1a42f25eb3d93399749067a752565344f796718bc4d1da53453407ea5f577d3d5e132a0c3aa79b682bc1933307a0cf299c87c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6284a899af20bf24b120f22175483da
SHA134d714a560dfd277fa8c09fa3dabb0356517135d
SHA256f75b6cc8a7d607027432388bd4b61fa0e59f0b95966be65f9cd363869b0bce9b
SHA5125e7c3e7f889902d3db40260472100aeb9f3e4d42ebc23cc34405ef1c3c302f0ad3eaebda0d3108576fea9a425dee55df2f2aec7d837413cf939c1c88f011e3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d367cee74cb0efd897756674217a204
SHA1aa12df75e0c1e32c29ae1e4d0481996ad5ac2101
SHA256516d3647965d3973398348d42f311044eb9735c7b98e39b61a900b1bd02b0a95
SHA5122a501bfd052e0d1627ed9351257ae7e4773f66af18ab4823f5adad1a94cc549113d4b56cf3533a315f82ac73d09d9c012ff44ff63cbe1e520d20444c66e2e5e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50436e9257836eba2e694337519020468
SHA146dc4a0fe3a71c7da17c71e431a2fc4a69d79d46
SHA256d21ca620c8a1d95d1bfd4c5a5c7cacd73904c2b2370e180dec4bc3fd6c13796a
SHA5122d5f92069ee4fd2fc236059d5ed5933b258aefe1d6cfe18770eb545aa51ff7eb8129fc442b0761a83d3bbf2ef4c8ea0b31c8512640227c05dc52a5960babfb8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585069026716eb024324f88292fec4617
SHA147207b0ae070e1a4619316bae4a238eecffe5559
SHA2564701d9a326a5cb771e17f73688ba9660e5d2d087f2e6c48a96a67ffc13e6c26d
SHA512ea131aa36880899af880c6369f06df452220db16aa7bee786c7977aec3d82d97e622c01bbb1b28747531b1bd13f862106c41c18c874e382bdee9e061b03c32c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f37cccb51eae3efd6056391f236b0fc0
SHA1a3e904228a87e10fbcb3f34d0a17b29a71a79225
SHA25648e7b3b67884bcb005b4a2d8980603431325e87c2cb12efe58718fed11d26f62
SHA512f7fbaecc89bd0dcfa3fb640e34f66b5512204b1c409b4f7ed318514f70287d38157fef69181eaa4def16c61f2b857d7efcd529f5017774ebfabcee7a8d8f2fb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1759eb623bcc159e79d5c1b06883b1b
SHA19c8bfd3e85e69e8771f4bd1a926ab368667edee3
SHA2568917d79d35071e67dd62f2c1c7e4eed86b5cbf9e6d130f73b843e45e6ebc60c9
SHA512532fb27512f393ff4ebd9cb813c67c133873136aaeda9e6028c3663c5858a392e9d5c16e9b43ae5c400b845578be374348a517c53baa06ac194fefafd265da5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4bd951940498b7906e80151f3e74c5
SHA1e315a8ebbedd02d7c51f980370e11347ab3d6360
SHA256c385e917d207899b7c398e5e2000255b4459fd22dbed818253e0b7cfb21a4e91
SHA512c8bda4558da743291c7d9d3a67bda5de705f1e67a29f4508cd46640c5c29d3fa9f912fa6ee86ba5d56b5376ce505f00d3fd28ec9654478367a9be035f4e4c7c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e24f4ff738d135431bb00e72a60fe242
SHA160a033375de7f7983cc312dd7fd5d0421b3dc8c2
SHA2567b3d19e0d2f4487a6b33008f958cee1b33f716881beb409f3ff3a96197839be6
SHA512fdd67212560ce750864d1bda64cce127ef78b76cfc3be85e027ea2e3113163c9d785a01db22f1d2cfd58a46d2a541db6f20d4443b3a0bef49f01e1add73b3a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5accce9ae0a79eca6ead751e08de2a43c
SHA12f22626a814c66bb22ae34a8219d7db627b1d49c
SHA256e7f925d58f3fcc07afc696a0f3cd15e5f031bbfb0c0ec1b4577a0bb66c48ad13
SHA5122a313f1988b44e5f0edcd73f4de744da6d4b226e31105f2a5c1a8b04ea39f491ebcf8daf6288e72761ff5d314c7f68e701edfff39f921474dec854839d0b05d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d799e28ca7b33668db0f4f31025846d0
SHA1c1d05c3265ea3a6d6122a4b37736e6f96f2d53e5
SHA256bd90a846348a33d6b5a677185c50d0c7181ba7585133eb1236041cef68055dc1
SHA512122052949ee2c538364e2898cf738b40f5972685956c0b0cd1e933a365e4a816a3be46619e3103cc1f996386c890f51ba576fb39a6379f9bed7682ce52087b90
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b